From 03027135541f26fd2adf839637a6f64263f847f0 Mon Sep 17 00:00:00 2001 From: "Hongli Lai (Phusion)" Date: Fri, 20 Jun 2014 11:33:10 +0200 Subject: [PATCH] Update documentation --- Changelog.md | 4 +++- README.md | 4 +++- 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/Changelog.md b/Changelog.md index f303700..de18281 100644 --- a/Changelog.md +++ b/Changelog.md @@ -3,8 +3,10 @@ * Introduced the `docker-bash` tool. This is a shortcut tool for logging into a container using SSH. Usage: `docker-bash `. See the README for details. * Fixed various process waiting issues in `my_init`. Closes GH-27, GH-82 and GH-83. Thanks to André Luiz dos Santos and Paul Annesley. * The `ca-certificates` package is now installed by default. This is because we include `apt-transport-https`, but Ubuntu 14.04 no longer installs `ca-certificates` by default anymore. Closes GH-73. + * Output print by Runit services are now redirected to the Docker logs instead of to proctitle. Thanks to Paul Annesley. + * Container environment variables are now made available to SSH root shells. If you login with SSH through a non-root account, then container environment variables are only made available if that user is a member of the `docker_env` group. Thanks to Bernard Potocki. * `add-apt-repository` is now installed by default. Closes GH-74. - * Various minor fixes thanks to yebyen and John Eckhart. + * Various minor fixes and contributions thanks to yebyen, John Eckhart, Christoffer Sawicki. ## 0.9.10 (release date: 2014-05-12) diff --git a/README.md b/README.md index 9dd9118..9c4eb37 100644 --- a/README.md +++ b/README.md @@ -288,7 +288,9 @@ But note that: #### Security -Because environment variables can potentially contain sensitive information, `/etc/container_environment` and its Bash and JSON dumps are by default owned by root, and accessible only by docker_env group (so any user added this group will have these variables automatically loaded). If you are sure that your environment variables don't contain sensitive data, then you can relax the permissions on that directory and those files by making them world-readable: +Because environment variables can potentially contain sensitive information, `/etc/container_environment` and its Bash and JSON dumps are by default owned by root, and accessible only by the `docker_env` group (so that any user added this group will have these variables automatically loaded). + +If you are sure that your environment variables don't contain sensitive data, then you can also relax the permissions on that directory and those files by making them world-readable: RUN chmod 755 /etc/container_environment RUN chmod 644 /etc/container_environment.sh /etc/container_environment.json